Computer Science, asked by Anonymous, 1 year ago

☆ Content quality required ☆


---------------------------------------------------------------------

♣ Computer programing language


----------------------------------------------------------------------

1. How to detect the hacker ?
Give 2 different methods for detecting hacker


2. How to became a ethical hacker


3. What is the work of ethical hacker



4. How hackers send viruses to computer.

Answers

Answered by Anonymous
18
Hello Sir,I Am Giving The Answer Of Your Question,Hope It Contain with full In information what u need☺️:-

firstly what is ethical hacker and what is their Works,,
=>An ethical hacker is a genius of computer software engineer or like that.they use to work for many organization for keeping their data Secure and increase the organization's network,and prevent the important documents from the theft or like that.

How to become an Ethical Hacker:-
=>To become An ethical hacker,the highest quality of computer software studying is needed.it can provide many computer engineering department or institution.
For Example, ICSS 【kolkata】 in west bengal,provides this education.

How To detect a Hacker:-
----------------------------------
To detect A Hacker,there are so many process.2 of them,
i)A real Hacker Never use to do any easy task.they always try to do a big thing means wants to hack a difficult document.

ii)A hacker always use to hack software and it's programs.if any of yours is embedded it should think hacker is worked on the data.

How Hackers send virus:-
–––––––––––––––––--
A computer Hacker Use His/Her Computer To connect this to the another software or mechine or like that things where He Wants to send virus.
They Need E-mail address of the Hacking place which email is connected with that data which he/she is hacking.then he send virus by his computer and the work get succes.

I shared about my knowledge.hope it helps.

prathamesh1855: No one Is On Insta
Anonymous: search " Be Brainly"
prathamesh1855: I'm Not On Insta
Anushkasampa123: Amazing!
Anonymous: thanks
Anushkasampa123: :)
Anonymous: ☺️
GovindKrishnan: Cool! ♥
Anonymous: thanks
Anonymous: ☺️
Answered by FuturePoet
15
yeah sure for your help

::::::::::::::::::::::::

1. we know most of the computer vulnerabilities can exploited in a variety of ways. Hacker attacks may use a single specific exploits , several exploits at the time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.
Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user.

Two methods for detecting hacker are

Bait and switch = using this technique a hacker can buy advertising spaces on the websites. Later when the user clicks on the ad,he might get directed to a page that's infected with malware. This way, they can further install malware or adware on your computer .

viruses, Trojan etc = viruses and Trojan are malicious software programs which installed into victim's system and keeps sending the victims data to hacker

:::::::::::::::::::::::::

2. Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure. and then address the issues to prevent incidents or attacks. For becoming it

1. Learn about common and emerging threats of systems.
2. Practice using tools to test networks and identify risks.
3. Implement countermeasures to prevent cybersecurity attacks

::::::::::::::::::::::::::::

3. working of ethnical hacker are the following

1. It is a proactive form of information security.
2.Businesses and organization hire ethnical hacker to help improve their networks, applications, and other computer system in order to prevent data theft and fraud

::::::::::::::::::::::

4. Hacker can use your computer in a number of ways. Two ways are listed below

1. send malicious emails to all the contracts in your email folders in order to spread viruses, malware and spyware.

2. use your computer as part of larger network of hijacked computers to direct attacks against targets such as banks and government.

::::::::::::::::::::::::

Hope it helps,






FuturePoet: sorry if something u see wrong in my answer . I tried my best for answering this
Anonymous: your answer is good ever better sister
Anonymous: hay chill it's nice answer
Anushkasampa123: Amazing!
GovindKrishnan: Great! ♥
Anonymous: nice
Similar questions